Results 81 to 90 of about 144,780 (287)
Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley +1 more source
Abstract Background Victimisation has been associated with self‐harm (with or without suicidal intent), but little is known about this association during young adulthood—a distinct developmental period. Further, not all individuals who experience victimisation will later engage in self‐harm, suggesting the influence of other factors.
Filip Marzecki +8 more
wiley +1 more source
Resort to Self-Defense Against Cyber Attacks by Non-State Actors in International Law10.22133/mtlj.2025.424362.1265 [PDF]
In the discussion of resorting to Self defenseSelf-defense against cyber attackscyber-attacks by non-State actors, at first it must be determined that for what type of cyber attackcyber-attack the right to Self defenseSelf-defense is allowed.
parviz farshasaid, Mahmoud Jalali
doaj +1 more source
This review synthesizes EEG findings from 28 VIMS studies across four inducing scenarios (abstract cues, virtual videos, vehicle driving, and game scenes) and two display types (HMD and monitor). While Delta/Theta enhancement consistently reflects sensory conflict, Alpha activity shows context dependency: predominantly increasing during passive viewing
Yanru Bai +5 more
wiley +1 more source
ABSTRACT This systematic literature review makes three key contributions to resilience research in SMEs. First, it advances theory by synthesizing the Resource‐Based View and Dynamic Capabilities perspective to develop a novel two‐dimensional framework of SME resilience (Adaptability × Resource availability), identifying four distinct resilience ...
Egena Ode +3 more
wiley +1 more source
RTAP: A Real-Time Model for Attack Detection and Prediction in Smart Grid Systems
One main challenge of smart grid systems is the cascading failures caused by cyber-attacks, which can affect the power and communication networks. Many testbeds have been proposed to model the impact of cyber-attacks on these two networks; however, many ...
Ali Salehpour, Irfan Al-Anbagi
doaj +1 more source
ABSTRACT Technological advancements aligned with sustainability and resilience requirements, as well as, a greater focus on human‐centric perspectives, are creating significant transformations in supply chains in this decade, bringing them to a more developed stage.
Guilherme F. Frederico
wiley +1 more source
Life after herbarium digitisation: Physical and digital collections, curation and use
Societal Impact Statement Collections of dried plant specimens (herbaria) provide an invaluable resource for the study of many areas of scientific interest and conservation globally. Digitisation increases access to specimens and metadata, enabling efficient use across a broad spectrum of research.
Alan James Paton +39 more
wiley +1 more source
ABSTRACT This study analyzes the architecture of the beyond 5G‐NTN (Non‐terrestrial Network) integrated network and presents the technical, legal, and regulatory challenges and considerations for expanding the Artificial Intelligence of Things (AIoT) ecosystem.
Byung Woon Kim, Ga Eun Choi
wiley +1 more source
Beyond Compliance: Corporate Governance and the Paradox of Gender Equality: Evidence From EU Firms
ABSTRACT The UN Sustainable Development Goal (SDG) 5 on gender equality is central to the European Union's sustainability and corporate governance agenda. While recent EU regulations have intensified expectations around board gender diversity (BGD) and social disclosure, the organisational drivers through which governance quality translates into ...
Suzan Dsouza +2 more
wiley +1 more source

